Curated articles, resources, tips and trends from the DevOps World.
Richard MacManus Richard is senior editor at The New Stack and writes a weekly column about web and application development trends. Previously he founded ReadWriteWeb in 2003 and built it into one of the world’s most influential technology news and analysis sites.
During the software development lifecycle, organizations have adopted peer code reviews as a common practice to keep improving code quality and prevent bugs from reaching applications in production.
Amazon Web Services (AWS) sponsored this post. Infrastructure has a tendency to sprawl. Data centers deal with server sprawl and VM sprawl. With the advent of containers, admins adapted to container sprawl with orchestration systems such as Kubernetes.
Organizations have worked hard over the past decade to bring development and operations teams together. Now they must face up to the challenge of integrating another siloed function: security.
GitOps is a modern cloud native approach to continuous deployment that leverages the Git version control/source control system as a single source of truth for all configuration, infrastructure, and operational procedures.
DataStax sponsored this article. Apache Pulsar, an open source stream processing platform, arrived later on the scene than Apache Kafka, but it’s starting to see growth in its community, vendor support and use cases.
In cryptography, the one-time pad, or OTP is a way of encrypting information so securely that it’s impossible to be cracked. That said, OTP has a major drawback in that it requires both parties to have access to the same key before a message is encrypted.
This week, Loft Labs’ vcluster became a certified Kubernetes distribution making it “the first virtual cluster solution that passes 100% of Kubernetes conformance tests.” according to a statement from the company.
Kubecon+CloudNativeCon is a sponsor of The New Stack. Sharing Kubernetes clusters across teams is extremely difficult. If you talk with people in the Kubernetes community, you’ll often hear them discuss how hard it is to get multitenancy right.
The Australian Cyber Security Center (ACSC) strongly advises against paying ransoms of any amount to cybercriminals. In some circumstances, these payments could even be illegal.
Have valuable insights to share with the DevOps community? Submit your article for publication.
Get the latest DevOps news, tools, and insights delivered to your inbox.
Made with pure grit © 2025 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com